{"id":3266,"date":"2012-03-19T10:00:47","date_gmt":"2012-03-19T10:00:47","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3266"},"modified":"2015-09-09T19:37:00","modified_gmt":"2015-09-09T11:37:00","slug":"ms12-020-rdp-exploit-code-in-the-wild","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2012\/03\/ms12-020-rdp-exploit-code-in-the-wild\/","title":{"rendered":"MS12-020 RDP Exploit Code In The Wild"},"content":{"rendered":"

The big news that erupted towards the end of last week was about the latest pretty serious vulnerability patched quietly by Microsoft<\/a>, AKA MS12-020 (which plenty of people are using to bait skiddies into downloading dodgy code).<\/p>\n

The flaw is in the RDP (Remote Desktop Protocol) service – which is a pretty bad service to have a flaw in as it’s generally exposed over the Internet – as that’s the whole point of it (remote access huhu).<\/p>\n

It reminds me of the predecessor to RDP – TS (Terminal Services) – who remembers that one? And TSGrinder<\/a> of course..<\/p>\n

Luigi Auriemma, the researcher who discovered a recently patched critical vulnerability in Microsoft’s Remote Desktop Protocol (RDP), published a proof-of-concept exploit for it after a separate working exploit, which he said possibly originated from Microsoft, was leaked online on Friday.<\/p>\n

Identified as CVE-2012-0002 and patched by Microsoft on Tuesday, the critical vulnerability can be exploited remotely to execute arbitrary code on systems that accept RDP connections.<\/p>\n

Security experts have expressed concern because exploiting this vulnerability does not require authentication, which means that it can be used to create a computer worm.<\/p>\n

However, the fact that RDP is disabled by default on Windows workstations limits the number of potential targets, so we shouldn’t worry about the next Conficker, said Carsten Eiram, chief security specialist at Danish vulnerability research firm Secunia.<\/p>\n

Even so, the vulnerability still presents an interest for attackers because the RDP service is commonly used in enterprise environments and is usually accessible through firewalls.<\/p>\n

“This is an attractive vulnerability from an exploitation standpoint and various parties are spending significant resources on developing reliable exploits for this,” Eiram said. <\/p><\/blockquote>\n

The upside? RDP is disabled by default, and most home users wouldn’t even know what it is. So I think we are pretty safe from some kind of mass infection worm type malware<\/a> spawning from this vulnerability. Also, right now only the PoC code is out there, not an actual working exploit – that keeps us safe from the people dealing with low hanging fruit.<\/p>\n

The downside? A LOT of businesses use RDP for support, desktop management and so on – and it’s quite often exposed to the Internet facing interfaces. Not a good idea, but since when did corporates make smart security decisions? Plus I don’t think it will take a massive amount of time for someone nefarious character to convert the PoC into a working exploit.<\/p>\n